Optimizing headless virtual machine memory management with global translation lookaside buffer shootdown

    公开(公告)号:US10725932B2

    公开(公告)日:2020-07-28

    申请号:US16204965

    申请日:2018-11-29

    Abstract: Systems, methods, and computer programs are disclosed for optimizing headless virtual memory management in a system on chip (SoC) with global translation lookaside buffer shootdown. The SoC comprises an application processor configured to execute a headful virtual machine and one or more SoC processing devices configured to execute a corresponding headless virtual machine. The method comprises issuing a virtual machine mapping command with a headless virtual machine having a first virtual machine identifier. In response to the virtual machine mapping command, a current value stored in a hardware register in the application processor is saved. The first virtual machine identifier associated with the headless virtual machine is loaded into the hardware register. A translation lookaside buffer (TLB) invalidate command is issued while the first virtual machine identifier is loaded in the hardware register. Upon completion of translation lookaside buffer synchronization, the current value is restored to the hardware register.

    EXCLUSIVE EXECUTION ENVIRONMENT WITHIN A SYSTEM-ON-A-CHIP COMPUTING SYSTEM

    公开(公告)号:US20180129828A1

    公开(公告)日:2018-05-10

    申请号:US15344384

    申请日:2016-11-04

    Abstract: Exemplary features pertain to establishing an Exclusive Execution Environment domain that Trusted Execution Zone components are forbidden to access. In one example, a system-on-a-chip (SoC) is equipped with a Reduced Instruction Set Computing (RISC) processor along with an application DSP (ADSP) and/or Graphics Processing Unit (GPU), where the ADSP and/or GPU is configured to provide and enforce the Exclusive Execution Environment domain. By forbidding access to Trusted Execution Zone components, security can be enhanced, especially within minimally-equipped devices that do not have the resources to implement a full Trust Execution Environment, such as low-power devices associated with the Internet of Things (IoT). Among other features, the systems and methods described herein allow application clients to build exclusive execution environments and claim exclusive access to buffer objects and hardware resource groups. Method and apparatus examples are provided.

    METHOD AND APPARATUS FOR USING CONTEXT INFORMATION TO PROTECT VIRTUAL MACHINE SECURITY
    19.
    发明申请
    METHOD AND APPARATUS FOR USING CONTEXT INFORMATION TO PROTECT VIRTUAL MACHINE SECURITY 审中-公开
    使用上下文信息保护虚拟机安全的方法和装置

    公开(公告)号:US20170031838A1

    公开(公告)日:2017-02-02

    申请号:US14811296

    申请日:2015-07-28

    Abstract: Disclosed is a method for protecting virtual machine data at a peripheral subsystem connected to at least one processor configured to host a plurality of virtual machines. In the method, context information, including a virtual machine identifier (VMID), is received. The VMID is unique to one of the plurality of virtual machines. A storage bank of a plurality of storage banks is selected based on the VMID included in the received context information. Each storage bank of the plurality of storage banks uses a same bus address range. A data bus is connected to the selected storage bank.

    Abstract translation: 公开了一种用于在与被配置为托管多个虚拟机的至少一个处理器连接的外围子系统上保护虚拟机数据的方法。 在该方法中,接收包括虚拟机标识符(VMID)的上下文信息。 VMID对于多个虚拟机之一是唯一的。 基于接收到的上下文信息中包含的VMID来选择多个存储体的存储体。 多个存储组的每个存储体使用相同的总线地址范围。 数据总线连接到选定的存储库。

    System and method for providing secure access control to a graphics processing unit
    20.
    发明授权
    System and method for providing secure access control to a graphics processing unit 有权
    用于向图形处理单元提供安全访问控制的系统和方法

    公开(公告)号:US09507961B2

    公开(公告)日:2016-11-29

    申请号:US14014032

    申请日:2013-08-29

    CPC classification number: G06F21/71 G06F21/74 G06F2221/2113 G06T1/20

    Abstract: Systems, methods, and computer programs are disclosed for providing secure access control to a graphics processing unit (GPU). One system includes a GPU, a plurality GPU programming interfaces, and a command processor. Each GPU programming interface is dynamically assigned to a different one of a plurality of security zones. Each GPU programming interface is configured to receive work orders issued by one or more applications associated with the corresponding security zone. The work orders comprise instructions to be executed by the GPU. The command processor is in communication with the plurality of GPU programming interfaces. The command processor is configured to control execution of the work orders received by the plurality of GPU programming interfaces using separate secure memory regions. Each secure memory region is allocated to one of the plurality of security zones.

    Abstract translation: 公开了用于向图形处理单元(GPU)提供安全访问控制的系统,方法和计算机程序。 一个系统包括GPU,多个GPU编程接口和命令处理器。 每个GPU编程接口被动态分配给多个安全区中的不同的一个。 每个GPU编程接口被配置为接收由与相应安全区相关联的一个或多个应用发出的工作命令。 工作单包括由GPU执行的指令。 命令处理器与多个GPU编程接口通信。 命令处理器被配置为使用单独的安全存储器区域来控制由多个GPU编程接口接收的工作订单的执行。 每个安全存储器区域被分配给多个安全区域中的一个。

Patent Agency Ranking